IP Layer Implementatoin of Linux Kernel Stack

Size: px
Start display at page:

Download "IP Layer Implementatoin of Linux Kernel Stack"

Transcription

1 IP Layer Implementatoin of Linux Kernel Stack Fida Ullah Khattak Department of Communication and Networking School of Electrical Engineering Aalto University ABSTRACT The foundations of modern day communication networks are based on the IPv4 protocol Though specifications of IPv4 are readily available, this is not the case with its implementation details Open source operating systems provide a chance to look at IPv4 implementation However, because of their changing nature, the documentation of open source operating systems is often out-dated This work is an attempt to document the implementation details of IPv4 in the Linux kernel 354 Detail description of IPv4 packet traversal paths at the Linux kernel is provided An overview of routing subsystem and its role in the IPv4 packet traversal is also given Keywords Linux Kernel Stack, IP Layer, Routing 1 INTRODUCTION The linux IP layer [2] implementation can be broken down into the input, the output and the forwarding paths The IP layer also interacts with supporting protocols, eg the ICMP [4], and subsytems, eg the routing subsytem, in the Linux stack for proper functioning An IP packet that enters the IP layer, has to traverse through one of the paths mentioned earlier Based on its origin and destination, the packet is routed to calculate the path of the datagram inside the Linux kernel The functionalities of input, output and forwarding path traversal are implemented in their respective files as shown in table 1 It also shows the files that implements the routing functionality A packet inside the kernel is represented with an sk_buff structure Apart from the datagram itself, this structure contains all necessary information required for routing the packet successfully sk_buff is a common structure between all Layers of the IP stack However, at a given time, only a single layer manipulates the values of this structure In some cases, it is also possible to create multiple copies of the same structure for concurrent processing Table 2 shows some other structures important for packet processing at the IP layer Few of these structures are exclusive to IP layer, while others are shared by different layers of the TCP/IP stack Figure 1 gives an overall view of how the datagrams are processed at different paths There are several netfilter hooks included in the traversal logic for filtering packets at different points The rest of the paper is structured as follows: Section 2 describes the ingress processing of IP datagram Section 4 covers forwarding while Section 5 explain the egress processing Routing subsystem is explained in section6 2 PROCESSING OF INGRESS IP DATAGRAMS The IP ingress traversal logic, defined in the ip_inputc file, is responsible for delivering the datagrams to a higher layer protocol or forwarding it to another host It consists of functions and netfilter hooks that process an incoming datagram As shown by Figure 1, this path starts with the ip_rcv() function and ends at the ip_local_deliver_finish() function The ip_rcv() function is registered as the handler function for incoming IP datagrams at the system startup by the ip_init() routine Before the control is passed to ip_rcv(), the lower layer function, netif_receive_skb(), sets the pointer of the socket buffer to the next layer (layer 3), such that the start of skb- >hdr is pointing to the IP header This way, the packet can be safely type-casted to an IP datagram We start with a brief description of each function at the input traversal path of IP layer, explaining how a datagram is processed on its way up the stack 1 ip rcv () The first check performed by ip_rcv() is to drop the packets that are not addressed to the host but have been received by the networking device in promiscous mode It may also clone the socket buffer if it is shared with the net device Next, ip_rcv() ensures that the IP header is entirely present in the dynamically allocated area Afterwards, the length, version and checksum values of the IP header are verified Once a packet has gone through all the sanity checks mentioned above, it is sent to the NF_INET_PRE_ROUTING hook This hook works as a filter to catch unwanted packets in the early stage If a packet gets through this hook, the control is passed to ip_recv_finish() function 2 ip recv finish() This function is passed as a function pointer to NF_INET_PR E_ROUTING hook and is called when the packet has successfully passed the hook It performs the key operation of routing the incoming datagrams using the ip_route_input_no_ref() function If a packet is successfully routed, the routing subsytem initializes the sk_buff->dst and the sk_buff->dst->input function pointer is set to one of the following three functions:

2 ip_local_deliver_finish() ip_queue_xmit() NF_INET_LOCAL_IN skb_routable? ip_local_deliver() Local ip_forwardc NF_INET_LOCAL_OUT Local or Remote? Remote Resolved ip_forward() NF_INET_FORWARD ip_forward_finish() Resolved ip_local_out() skb_routable? ip_output() Ip_rcv_finish() Route Cache Routing Table(s) Routing Subsystem ip_finish_output() NF_INET_PRE_ROUTING routec fibc NF_INET_POST_ROUTING Ip_rcv() Ip_finish_output2 ip_inputc ip_outputc Figure 1: Traversal of an IP datagram through Linux stack Table 1: IPv4 Important files File Name Explanation net/ipv4 inputc Functions related to ingress path net/ipv4 outputc Functions related to egress path net/ipv4 forwardc Functions related to forwarding path net/ipv4 fragmentc Functions related to IP fragmentation net/ipv4 routec Implementation of the IP router (a)ip_forward() function is selected if the destination is not the local host and the packet is to be forwarded to another host (b)ip_local_deliver() function is selected if the packet is destined for the local host and has to be sent further up the stack (c)ip_mr_input() function is selected if the packet is a multicast packet Once the proper handler has been selected, IP options are processed by calling ip_rcv_options() function The last step of this routine is the call to the dest_input() function, which in turn calls the function selected during the routing lookup by calling the skb->dst->input() 3 ip local deliver () If the routing logic finds that a packet has to be delivered localy to a higher layer protocol, it assigns the pointer of ip_local_delivery() function in the skb->dst->input() function pointer The ip_local_deliver() routine is incharge of defragmentation It calls the ip_defrag() function to queue the fragmented datagrams untill all the fragments have been received After receiving a complete, unfragmented datagram,ip_loc al_deliver() calls the NF_INET_LOCAL_IN hook and passes ip_local_deliver_finish() as the function pointer to be called after the netfilter processing 4 local deliver finish () When a datagram successfuly passes the netfilter hook called at the previous step, it is passed on to ip_local_deliver _finish() for some final processing at the IP layer This function strips the IP header from the sk_buffer structure and finds the handler for further processing based on the value of protocol field in the IP header 3 FORWARDING OF IP DATAGRAMS As shown in Figure 1, datagrams that reach the forwarding section have already been routed by the input path and do not require another routing lookup This makes the forwarding path relatively simple in comparison to the input or the output path Forwarding path is responsible for checking

3 Table 2: IPv4 Related Data Structures Data Structure Location Explanation sk buff skbuffh Socket buffer data structure flowi4 flowh Flow of traffic based on combination of fields dst entry dsth protocol independent cached routes iphdr iph IP header fields ip options inet sockh IP options of the header ipq ip fragmentc Incomplete datagram queue entry (fragment) in device inet deviceh IPv4 related configuration of network device the optional features of source routing [1] and router alert option [3] before forwarding packets to other hosts IPSEC policy checks for forwarded packets are also performed in the forwarding path Source routing option can be used by a sender to specify a list of routers through which a datagram should be delivered to the destination Strict source routing implies that datagram must traverse all the nodes specified in the source routing list If a datagram contains a source routing option, the forwarding path checks if the next hop selected by the route lookup process matches the one indicated in the source routing list In case the two hops are not the same, the packet is dropped and the source of the datagram is notified by sending an ICMP message Router alert option is used to indicate to the routers that a datagram needs special processing This option is used by protocols like Resource Reservation Protocol [5] A function can register itself as a handler for routing alert option, and if a datagram with a router alert option is received, the forwarding path calls this handler function We briefly take a look at the main functions, defined in ip_forwardc file, responsible for handling datagrams through the forwarding path 1 ip forward() ip_forward() is the function that performs most of the forwarding related tasks, including the check for source routing and router alert options Control is passed to the forwarding block when the routing logic decides that the packet is to be forwarded to another host and sets skb->dst->input pointer to the ip_forward() function Figure 3 shows the sequence of events in the ip_forward() function It first checks for the IPSEC forwarding policies and the router alert option followed by checking the current TTL value of the datagram If the router alert option is found, this function calls the corresponding handler responsible for implementing the route alert functionality and does not process the packet itself If the TTL value of datagram is going to expire, an ICMP TIME EXCEEDED message is sent to the source and the packet is discarded Afterwards, the packet is checked for source routing If the datagram contains a strict source routing option, it is made sure that the next hop, as mentioned in the source route list, is the same as calculated by the local route lookup If not, the packet is discarded and source is notified At the end of the function, the netfilter hook, NF_INET_FOR WARD is called, and ip forward finish() is passed as function pointer to the hook This function is later executed if the packet successfully passes through the netfilter hook 2 ip forward finish() The ip_forward_finish () function calls the ip_forward_ options() funciton to finalize any processing required by the options included in the datagram and calculates the checksum At this stage the IP header has been created and the datagram has successfully traversed all checks in the forwarding block To transmit the packet, ip_forward_finish() calls dst_output() function, another function set by the routing subsystem during the ingress traversal 4 PROCESSING OF EGRESS IP DATAGRAMS A higher layer protocol can pass data to IP layer in different ways Protocols like TCP and SCTP, which fragment the packets themselves, interact with IP layer for outgoing datagrams through ip_que_xmit() function Others protocols like UDP, that do not necessarily take care of the fragmentation, can call ip_append_data() and ip_append_page() functions to buffer data in Layer 3 This buffered data can then be pushed as a single datagram by calling the ip_push _pending_frames() function TCP also uses ip_build_and _send_pkt() and ip_send_reply() functions for transmitting SYN ACKs and RESET messages respectively However, as ip_queue_xmit() is the most widely used method for interacting with upper layer protocols, here we discuss the sequence of events when this function is called (a) ip queue xmit () ip_queue_xmit() is the main function of egress path which performs many critical operations on the datagramfigure 3 shows some of the main ip_queue_xmit() operations It is in the ip_queue_xmit() function that the outgoing datagram is routed and a destination is set for the packet The routing information required by a datagram is stored in skb->dst field In some cases, it is possible that the outgoing datagram has already been routed (eg by SCTP) and the skb->dst contains a valid route In that case, ip_queue_xmit() skips the routing procedure, creates the IP header and sends the packet out In most cases, the skb->dst entry is empty and has to be filled by the ip_queue_xmit() function There are three possible ways to route the packet i The first option to find a valid route for an outgoing datagram is by using information from the socket structure The socket structure is a part of sk_buffer structure and is passed as an argument to sk_dst_check() function to search for an available route If packets have already been sent by this socket, it will have a destination stored and can be used by any future packets originating from this socket ii Another way to find a route is through a cache lookup

4 xfrm_policy_check Fail skb_queue_xmit() skb_dst_check() Pass Router Alert Option Call Handler skb_routable? Pass? Build_ip_header() ip_route_output_ports() TTL <=1 Send ICMP TIME EXCEEDED ip_option_build() ip_route_ip_flow() ip_local_out() ip_route_output_key() Xfrm_route_forward Fail Pass NF_INET_LOCAL_OUT Found? Strict Source Route Next Hop SSR == Next Hop Local ip_route_ip_slow() TTL=TTL-1 fib_lookup() NF_INET_FORWARD Fail Found? Pass Ip_forward_finish Figure 2: Forwarding of IP Datagrams Figure 3: Egress Processing and Route Lookup operation If there is no route present in the socket structure sk_buffer->sk, the ip_queue_xmit() calls ip_rout e_output_key() function for a lookup of a possible route in the routing cache This call is made through nested wrapper functions, ip_ro ute_output_ports() and ip_route_output_flow(), which besides calling the ip_route_output_key() function, perform IPSEC checks by calling the functions of XFRM framework and create a flowi4 structure The flowi structure is later used by ip_route_output_key() function for routing cache lookup iii If route cache lookup also fails, ip_route_output_sl ow() is called as a last resort to find a possible route by performing a lookup on the routing table known as the forwarding information base (FIB) After resolving the route, the ip_que_xmit() function creates the IP header by using the skb_push() function Ip_ options_build() is called to build any IP options As the last step, dst_output() function is called If no routes exist to the host, the packet is dropped while incrementing the IPSTATS_MIB_NOROUTES counter (b) ip local out() This function is a wrapper for ip_local_out() which computes the checksum for outgoing datagram after initializing the value for IP header total length It then calls the netfilter hook NF_INET_LOCAL_OUT, passing the dst_output() function as a function pointer 3 dst output() Like the dst_input() function used for processing of incoming datagrams, dst_output() function is a wrapper for the function pointer skb->dst->output This function pointer is set to a specific function when the route lookup operation is performed and skb->dst is initializedin the case when the outgoing datagram is a unicast packet, the skb- >dst->output is set to ip_output() function For multicast packets, the value of skb->dst->output will point to the ip_mc_output() function If a packet successfully passes through the NF_INET_LOCAL _OUT hook called in the previous step, it is passed to the dst_output() functionat this point the datagram has been routed and its IP header is in place The dst output () function is called not only at the egress path but also at the forwarding path to transmit the outgoing packets As the next step, this function invokes the function assigned to the skb->dst->output pointer 4 ip output() This function is invoked for transmission of unicast datagrams It is responsible for updating the stats of the outgoing packets for the network device and calls the netfilter hook NF_INET_POST_ROUTING ip_finish_output() is passed as a function pointer to the hook 5 Ip finish output() If the datagram traverses the NF_INET_POST_ROUTING hook successfully, it is passed to the Ip_finish_output() function for fragmentation checks A packet with size more than the MTU is fragmented by calling the ip_fragment() function When fragmentation is not required, the ip_finish_output2() function is called, which is the last hop for egress datagram processing at IP layer

5 Bucket 1 Bucket 2 Bucket 3 Bucket 4 Bucket 5 Rt_hash_table Next dst_entry {} struct rcu_head struct dst_entry struct net_device struct dst_ops Next dst_entry {} rcu_head *child; *dev; *ops; Figure 4: A simplified route cache Next dst_entry {} 6 ip finish output2() This function increments the counters for multicast and broadcast packets It makes sure that the skb has enough space for the layer MAC header It then tries to find the L2 neighbor address by searching for a prior cached entry for the destination If that fails, it tries to resolve the L2 address by invoking the neigh->output() routine After finding the L2 address, it calls the corresponding L2 handler for further processing In case the search for L2 address fails, it drops the packet 5 ROUTING SUBSYSTEM The routing subsystem is essential to TCP/IP stack and it consists of a single routing cache and possibly many routing tables The routing cache is a quick way for route resolution of datagrams In case the route cache fails to provide an appropriate route entry, the routing tables are consulted to resolve the route Routing subsytem is initialized at the system startup by ip_init() function by calling ip_rt_init() routine This routine initializes the routing cache by setting up the timers, defining the size of the cache and starting the garbage collector The routing table is initialized by calling the _ip_fib _init() and devinet_init() functions to register handlers and initialize the fib database Routing subsytem is used by both input and output traversal paths of the stack to route a datagram A successful lookup of route cache or routing table will result in a route entry for that particular datagram Routing a packet inside the kernel is equivalent to setting a valid skb->dst entry in the socket buffer This entry is critical for both incoming and outgoing datagrams The skb->dst->input and skb->dst->output function pointers, used to direct the flow of control at various points, are set through the routing subsystem with appropriate handlers based on the destination address Examples of such assignments are given in both ingress and egress traversal path 51 Route Cache A route cache lookup is the faster way to route packets in the Linux routing subsystem The ip route input no ref() function of the incoming traversal path and the ip route output key() function of the output traversal path resolve routes for incoming and outgoing datagrams respectively, by performing the route lookup operation on the cache The route cache is implemented using the elements ofdst e ntry structure, linked together to form rt hash bucket It is searched by using a hash code composed of the destination address, the source address, the TOS field values and the ingress or egress device The computed hash code is compared against the hash code of the hash buckets, and if a match is found, the entries in the bucket are compared against the values of flowi4 structure that is passed as an argument to the route lookup operation Every time a route entry is successfully returned after a route lookup, a reference counter to the route cache entry is incremented As long as the reference count is positive, the entry is not deleted A garbage collection mechanism for routing cache makes sure that old and unused cache entries are deleted to create space for new entries in the cache 52 Routing Table The routing table is a complicated data structure A default routing table has two tables, an ip fib local table and an ip fib main table The entries in the routing tables are accessed through hash lookups, which provide an efficient search mechanism for matching route entries The IP layer functions use ip_route_output_slow function to perform route lookups in the routing table, usually after route cache has failed This function returns a pointer to routing table entry structures of net and flowi4 are given as arguments Information about the source address, destination address, possible output interface is gathered from the flowi4 structure The type of service, input interface (as loopback by default) and and scope of the flow (RT SCOPE LINK, RT SCOPE UNIVERSE) is gathered from the net argument and used for searching the route entries 6 CONCLUSIONS Even though IP is an old and mature protocol, its kernel implementation is constantly changing due to additions and enhancements In this paper, we discussed the implementation of IPv4 in a state of the art Linux kernel 1 The input, output and forwarding paths were discussed in detail and the role of the routing subsystem in the routing of IP datagrams was explained It will be interesting to experiment with the size of routing cache and its impact on route lookup process as an extension to this work in the future 7 REFERENCES [1] Ip source route options junos-es/junos-es92/junos-es-swconfig-security/ ip-source-route-optionshtml [2] I S Institute Internet Protocol RFC 791, RFC Editor, September version 354

6 [3] D Katz IP Router Alert Option RFC 2113, RFC Editor, February 1997 [4] J Postel Internet Control Message Protocol RFC 792, RFC Editor, September 1981 [5] S B R Braden, L Zhang Resource Reservation Protocol RFC 2205, RFC Editor, September 1997

Operating Systems Design 16. Networking: Sockets

Operating Systems Design 16. Networking: Sockets Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski pxk@cs.rutgers.edu 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify

More information

Network packet capture in Linux kernelspace

Network packet capture in Linux kernelspace Network packet capture in Linux kernelspace An overview of the network stack in the Linux kernel Beraldo Leal beraldo@ime.usp.br http://www.ime.usp.br/~beraldo/ Institute of Mathematics and Statistics

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

SEP Packet Capturing Using the Linux Netfilter Framework Ivan Pronchev pronchev@in.tum.de

SEP Packet Capturing Using the Linux Netfilter Framework Ivan Pronchev pronchev@in.tum.de SEP Packet Capturing Using the Linux Netfilter Framework Ivan Pronchev pronchev@in.tum.de Today's Agenda Goals of the Project Motivation Revision Design Enhancements tcpdump vs kernel sniffer Interesting

More information

IMPROVING PERFORMANCE OF SMTP RELAY SERVERS AN IN-KERNEL APPROACH MAYURESH KASTURE. (Under the Direction of Kang Li) ABSTRACT

IMPROVING PERFORMANCE OF SMTP RELAY SERVERS AN IN-KERNEL APPROACH MAYURESH KASTURE. (Under the Direction of Kang Li) ABSTRACT IMPROVING PERFORMANCE OF SMTP RELAY SERVERS AN IN-KERNEL APPROACH by MAYURESH KASTURE (Under the Direction of Kang Li) ABSTRACT With continuous increase in average size and number of e-mails on the Internet,

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Configuring Flexible NetFlow

Configuring Flexible NetFlow CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

IP - The Internet Protocol

IP - The Internet Protocol Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Internet Architecture and Philosophy

Internet Architecture and Philosophy Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Thomas Nau, kiz Lecture Computer Networks

More information

Lab 6: Building Your Own Firewall

Lab 6: Building Your Own Firewall CS498 Systems and Networking Lab Spring 2012 Lab 6: Building Your Own Firewall Instructor: Matthew Caesar Due: Firewalls are widely deployed technologies for protecting networks from unauthorized access

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internetworking. Problem: There is more than one network (heterogeneity & scale) Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

NETWORK LAYER/INTERNET PROTOCOLS

NETWORK LAYER/INTERNET PROTOCOLS CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Request for Comments: 1788 Category: Experimental April 1995

Request for Comments: 1788 Category: Experimental April 1995 Network Working Group W. Simpson Request for Comments: 1788 Daydreamer Category: Experimental April 1995 Status of this Memo ICMP Domain Name Messages This document defines an Experimental Protocol for

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers

Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

8.2 The Internet Protocol

8.2 The Internet Protocol TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Neighbour Discovery in IPv6

Neighbour Discovery in IPv6 Neighbour Discovery in IPv6 Andrew Hines Topic No: 17 Email: hines@zitmail.uni-paderborn.de Organiser: Christian Schindelhauer University of Paderborn Immatriculation No: 6225220 August 4, 2004 1 Abstract

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

IPv6 Specific Issues to Track States of Network Flows

IPv6 Specific Issues to Track States of Network Flows IPv6 Specific Issues to Track States of Network Flows Yasuyuki Kozakai Corporate Research & Development Center, Toshiba Corporation yasuyuki.kozakai@toshiba.co.jp Hiroshi Esaki Graduate School of Information

More information

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode 13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4

More information

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Understanding and Configuring NAT Tech Note PAN-OS 4.1 Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

AlliedWare Plus OS How To Use sflow in a Network

AlliedWare Plus OS How To Use sflow in a Network AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

Netfilter s connection tracking system

Netfilter s connection tracking system PABLO NEIRA AYUSO Netfilter s connection tracking system Pablo Neira Ayuso has an M.S. in computer science and has worked for several companies in the IT security industry, with a focus on open source

More information

Internet Ideal: Simple Network Model

Internet Ideal: Simple Network Model Middleboxes Reading: Ch. 8.4 Internet Ideal: Simple Network Model Globally unique identifiers Each node has a unique, fixed IP address reachable from everyone and everywhere Simple packet forwarding Network

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Linux MPS Firewall Supplement

Linux MPS Firewall Supplement Linux MPS Firewall Supplement First Edition April 2007 Table of Contents Introduction...1 Two Options for Building a Firewall...2 Overview of the iptables Command-Line Utility...2 Overview of the set_fwlevel

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Introduction to Cisco IOS Flexible NetFlow

Introduction to Cisco IOS Flexible NetFlow Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity

More information

Chapter 13 Internet Protocol (IP)

Chapter 13 Internet Protocol (IP) Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

Removing The Linux Routing Cache

Removing The Linux Routing Cache Removing The Red Hat Inc. Columbia University, New York, 2012 Removing The 1 Linux Maintainership 2 3 4 5 Removing The My Background Started working on the kernel 18+ years ago. First project: helping

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P 19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Denial of Service Attacks and Countermeasures Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS) Student Objectives Upon successful completion of this module,

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.

More information

Firewall Implementation

Firewall Implementation CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of

More information

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority

More information

Overview of TCP/IP. TCP/IP and Internet

Overview of TCP/IP. TCP/IP and Internet Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating

More information

Network Management and Debugging. Jing Zhou

Network Management and Debugging. Jing Zhou Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for

More information

Understanding Layer 2, 3, and 4 Protocols

Understanding Layer 2, 3, and 4 Protocols 2 Understanding Layer 2, 3, and 4 Protocols While many of the concepts well known to traditional Layer 2 and Layer 3 networking still hold true in content switching applications, the area introduces new

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Internet Control Protocols Reading: Chapter 3

Internet Control Protocols Reading: Chapter 3 Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters

More information

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture. Multiprotocol Label Switching (), originating in IPv4, was initially proposed to improve forwarding speed. Its core technology can be extended to multiple network protocols, such as IPv6, Internet Packet

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Improving DNS performance using Stateless TCP in FreeBSD 9

Improving DNS performance using Stateless TCP in FreeBSD 9 Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

IP Routing Features. Contents

IP Routing Features. Contents 7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26 Broadband Networks Prof. Karandikar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Optical Network &MPLS So, as you were discussing in the previous lectures, next

More information

Packet Monitor in SonicOS 5.8

Packet Monitor in SonicOS 5.8 Packet Monitor in SonicOS 5.8 Document Contents This document contains the following sections: Packet Monitor Overview on page 1 Configuring Packet Monitor on page 5 Using Packet Monitor and Packet Mirror

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

Chapter 11. User Datagram Protocol (UDP)

Chapter 11. User Datagram Protocol (UDP) Chapter 11 User Datagram Protocol (UDP) The McGraw-Hill Companies, Inc., 2000 1 CONTENTS PROCESS-TO-PROCESS COMMUNICATION USER DATAGRAM CHECKSUM UDP OPERATION USE OF UDP UDP PACKAGE The McGraw-Hill Companies,

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

TCP/IP Network Essentials. Linux System Administration and IP Services

TCP/IP Network Essentials. Linux System Administration and IP Services TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

IPv6 Associated Protocols

IPv6 Associated Protocols IPv6 Associated Protocols 1 New Protocols (1) New features are specified in IPv6 Protocol -RFC 2460 DS Neighbor Discovery (NDP) -RFC 4861 DS Auto-configuration : Stateless Address Auto-configuration -RFC

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information